CVE-2024-3250

It was discovered that Canonical's Pebble service manager read-file API and the associated pebble pull command, before v1.10.2, allowed unprivileged local users to read files with root-equivalent permissions when Pebble was running as root. Fixes are also available as backports to v1.1.1, v1.4.2, and v1.7.4.
Configurations

No configuration.

History

06 Nov 2024, 16:35

Type Values Removed Values Added
Summary
  • (es) Se descubrió que la API de lectura de archivos del administrador de servicios Pebble de Canonical y el comando pebble pull asociado, antes de v1.10.2, permitían a los usuarios locales sin privilegios leer archivos con permisos equivalentes a root cuando Pebble se ejecutaba como root. Las correcciones también están disponibles como backports para v1.1.1, v1.4.2 y v1.7.4.
CWE CWE-732

04 Apr 2024, 22:15

Type Values Removed Values Added
Summary (en) It was discovered that Pebble's read-file API and the associated pebble pull command, before v1.10.2, allowed unprivileged local users to read files with root-equivalent permissions when Pebble was running as root. Fixes are also available as backports to v1.1.1, v1.4.2, and v1.7.4. (en) It was discovered that Canonical's Pebble service manager read-file API and the associated pebble pull command, before v1.10.2, allowed unprivileged local users to read files with root-equivalent permissions when Pebble was running as root. Fixes are also available as backports to v1.1.1, v1.4.2, and v1.7.4.

04 Apr 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-04 15:15

Updated : 2024-11-06 16:35


NVD link : CVE-2024-3250

Mitre link : CVE-2024-3250

CVE.ORG link : CVE-2024-3250


JSON object : View

Products Affected

No product.

CWE
CWE-732

Incorrect Permission Assignment for Critical Resource